World Library  



CrossTalk Journal Collection (149 Books)


Description: Recommendations concerning Capability Maturity Model Integration; effective COTS integration requires a fundamental paradigm shift; a framework for the reliable evolution of software systems; a particular application of the IIDA process model described in Part I; how to improve the quality and efficiency of team-based projects; a method to use CMM practices on small projects; liability issues surrounding the software certification laboratories phenomenon; how to achieve a statistically correct sample for testing and evaluation; three lines of defense managers can use to guard against bad engineering.

 
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, April 199...

By: Mark D. Schaeffer, Lisa Brownsword, David Carney, Tricia Oberndorf, Lui Sha, John B. Goodenough, Bill Pollak, Greg Fox, Steven Marcom, Karen W. Lantner, Watts S. Humphrey, Rita Hadden, Jeffrey Voas, Jesse H. Poore, Carmen J. Trammell, Norman F. Simenson

Description: Recommendations concerning Capability Maturity Model Integration; effective COTS integration requires a fundamental paradigm shift; a framework for the reliable evolution of software systems; a particular application of the IIDA process model described in Part I; how to improve the quality and efficiency of team-based projects; a method to use CMM practices on small projects; liability issues surrounding the software certification laboratories phenomenon; ho...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, April 199...

By: Bala Subramaniam, Alan M. Davis, Dean A. Leffingwell, Col. Henry M. Mason, Larry W. Smith, A. Todd Steadman, Alan M. Christie

Description: How to implement a defect-tracking process in your organization; quality software products begin with the requirements phase; lessons learned from one sponsor's experiences; the major principles and purposes of these important management tools; a method to bring insight into complex process behavior.

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, April 200...

By: Barry W. Boehm, Chris Abts, Jongmoon Baik, A. Winsor Brown, Sunita Chulani, Brad Clark, Ellis Horowitz, Ray Madachy, Don Reifer, Bert Steece, Dr. Richard D. Stutzke, Daniel V. Ferrens, David S. Christensen, David Peeters, George Dewey, Jim Restel, Ingmar Ogren

Description: A major team effort was recently completed to re-engineer the original Constructive Cost Model (COCOMO) for software cost and schedule estimation into a new model, COCOMO II; this article reviews challenges of software estimation, and research under way to aDress them; many sophisticated parametric models exist; however, their predictive accuracy is questionable; biases in the estimating process contribute to poor estimates. How can they be reduced?; the Aut...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, April 200...

By: Robert A. Martin, P.A. Dargan, David A. Hayes, Eli Schragenheim, H. William Dettmer, Lt. Col. Lionel D. Alford Jr.

Description: The Office of the Director of Defense Research and Engineering is sponsoring an effort to recognize the top five software projects in the government; the commercial software used to build systems is an often overlooked security weakness that could be solved by adopting common vulnerability naming practices; the Intelligence Community Collaboration Forum envisions the ideal environmental mix of e-mail, bulletin boards, chat sessions, and virtual rooms, and th...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, April 200...

By: Theron R. Leishman, Dr. David A. Cook, Dr. Ralph R. Young, Al Florence, Michael W. Evans, Alex M. Abela, Thomas Beltz, Barbara Cavanaugh Phillips, Susan M. Polen, David Cottengim

Description: This article presents several requirements risks that can impact a software project's success, along with strategies to help mitigate their impact; applying and using the requirements gathering practices recommended in this article can make a significant difference in understanding, prioritizing, tracing, and changing requirements throughout development efforts; the author lists 11 examples of legacy systems requirements initially specified by project teams,...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, April 200...

By: Dr. Gerald M. Weinberg, Dr. Bill Curtis, Dr. William E. Hefley, Sally A. Miller, Virginia Slavin, Paul Kimmerly, Kasey Thompson, Juris Kelley, Diana Mekelburg

Description: This article explains how large systems-development projects fail when people destroy communication and control within an organization, either intentionally or not. The author also reveals where and when project managers can intervene with countermeasures; in the seven years since its release, the People Capability Maturity Model has become a road map for implementing practices that continually improve the capabilities of an organization's work force. if you...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, April 200...

By: Lisa Pracchia, Dr. Richard Turner, Robert W. Ferguson, John S. Willison, Michael S. Russell, Michael J. Hillelsohn, D.B. Robi

Description: This article outlines the Department of Defense's implementation guidance for section 804 of the National Defense Authorization Act for Fiscal Year 2003, including one approach taken by the Naval Air Systems Command's software acquisition and process improvement program; this author proposes that a methodical approach to gathering and analyzing data about best practices can help build tools to select practices that are appropriate for a particular project; t...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, April 200...

By: William Roetzheim, Capers Jones, Carol A. Dekkers, Lawrence H. Putnam, Douglas T. Putnam, Donald M. Beckett, Dr. Barry Boehm, Ricardo Valerdi, Jo Ann Lane, A. Winsor Brown, Lee Fischman, Karen McRitchie, Daniel D. Galorath, Joe Schofield, Don O'Neill, Norman Hines

Description: This article walks the reader through the basic process and considerations needed to determine the project scope for new development, including maintenance builds; while not recommended, guesstimating auditable and more realistic numbers before requirements have been fully fleshed out is possible using the practices outlined in this article; here is an overview of the models in the COCOMO suite, and how they can be used together to support larger software sy...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, April 200...

By: LTC John Surdu Ph.D., Doug J. Parsons, Dr. Kenneth D. Shere, Diane A. Glaser, Michael D. Barnett, Dr. Andrew J. Kornecki, Dr. Janusz Zalewski, Eduardo Miranda, Dr. Ronald J. Leach, Joe Schofield

Description: These authors discuss how they combined agile and traditional software development techniques for this award-winning program; here are some helpful guidelines for managing cultural changes in your organization whether you implement maturity models, Six Sigma, or other techniques to improve your processes; this article describes the authors’ efforts in performing post-award cooperative appraisals, the lessons learned, and the benefits to both the government a...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, April 200...

By: Dr. Alistair Cockburn, Esther Derby, Dr. Richard Turner, David R. Webb, Dr. Gene Miluk, Jim Van Buren, Dr. David G. Ullman, Dr. Rajive Joshi

Description: This article equates software engineering decisions to manufacturing products. It then picks six lessons from the last 50 years in manufacturing and applies these lessons to software development; in this article, Esther Derby outlines key collaboration skills that help teams maintain productive relationships, avoid destructive conflict, and benefit from everyone’s best ideas; this article presents thoughts on agility and systems engineering, looking at how s...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, April 200...

By: Capers Jones, Kym Henderson, Dr. Ofer Zwikael, Walt Lipke, Dr. David J. Coe, David Premeaux, Phillip G. Armour

Description: This article concentrates on four worst practices and the factors that most often lead to failure and litigation and gives advice on how to avoid them; this article investigates whether the SPI(t) exhibits similar stability characteristics to those extensively reported for the Cost Performance Index in Earned Value Management; this article utilizes the new practice of Earned Schedule to discuss a proposed measure for further enhancing the practice of Earned ...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, August 19...

By: Lt. Col. Scott B. Dufaud, Thomas V. Ashton, George H. Wedberg, Capt. Brian Hermann, Jim Russell, David B. Putman, Aaron B. Binkley, Stephen R. Schach, Elizabeth C. L. Starrett, Maj. Art Huber, Lt. Col. Jay G. Santee

Description: Why the year 2000 problem could seriously threaten our nation's security--but only if we let it; how to officially certify that your year 2000 fixes have been successful; real-world lessons on how metrics can help improve processes, communication, and teamwork; metrics to determine when software products should move to their next major phase; increase savings and quality by aDing statistical controls to automated test programs; the coupling dependency metric...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, August 19...

By: Dr. Delores Etter, Bonnie R. Troup, Brian P. Gallagher, Gregory Daich, Lawrence G. Jones, Jerry Kastning, Jeff Herman, Marilyn Ginsberg-Finner, Jim Heil

Description: The Deputy Under Secretary of Defense gives her thoughts on software acquisition; two methods used during source selection to evaluate a contractor's software development capability; reviewing project plans, requirements, and test plans for software acquisition success; results of two Department of Defense product line workshops; lowering program risks and producing a quality product with the Software Insight Tool.

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, August 20...

By: Tim Kasse, Patricia A. McQuaid, George Jackelen, George Holt, Dr. David K. Mann, Darwin Ammala, John W. McCormick, Lori Pajerek

Description: Consider critical factors in starting a process improvement initiative; how one group developed best practices and initiated process development; effectively managing risks and challenges is critical in software development and engineering; collaborative software development and sustaining engineering resulted in reduced cost/schedule; using CONOPS to address a single aspect--in this case, security--in a large-scale Navy project; real-time embedded software ...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, August 20...

By: Frederick I. Moxley, Lucien Simon, Elbert J. Wells, Chellam Embar, Alastair James, Aldo Liso, Kurt D. Welker, Toshihiro Komiyama, Toshihiko Sunazuka, Shinji Koyama, Al Florence

Description: The structural foundation laid by this architectural approach allows information sharing among diverse C3 systems--the key to successful joint military operations; this author sheds some light on the status of India's software industry after participating in a technology tour; the majority of Australia's software development organizations are small- to medium-sized businesses that need education and training to understand that best practices bring increased ...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, August 20...

By: Dr. Matthew J. Fisher, Wolfhart B. Goethert, Dr. Lawrence G. Jones, Col. Donald P. Kotchman, David W. Schepke, Leonard M. Konwinski, Edward Andres, Randy Schneider, Mike Olsem, Quentin W. Fleming, Lawrence H. Putnam, Ware Myers, Lloyd K. Mosemann II, David P. Quinn, Lt. Col. Kenneth L. Alford

Description: The principles that help successfully apply the SA-CMM are described in this article along with lessons learned from successful and less successful programs using the model; this article describes the path PM Abrams took to improve its overall acquisition process and become the first federal organization to achieve Software Acquisition Capability Maturity Model Level 2; this article includes information from a memo issued by the Under Secretary of Defense to...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, August 20...

By: Michael Acton, Dr. Malcolm Morrison, Dr. Joel Sherrill, Ron O'Guin, Deborah A. Butler, Eric Z. Maass, Bradley C. Logan, Gregory T. Daich

Description: This article defines high availability and offers approaches for producing maintainable, highly available Web applications to serve the warfighter, including an architecture that designs away all single points of failure; to support the U.S. Army's Future Combat Systems program, a versatile, modular fire control software architecture is being developed that is capable of satisfying the flexibility and rapid mission reconfiguration requirements of this future...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, August 20...

By: Ivy Hooks, Brian P. Gallagher, Sandy Shrum, Dr. Norman F. Schneidewind, Dr. Robert Charette, Laura M. Dwinnell, John McGarry, Lawrence Bernstein, Dr. Chandra M. R. Kintala, John Wunder

Description: Here is a look at needed processes when developing a system of systems, including applying requirements management, considering dynamic scope, and using standards to interface systems; the best practices in this article form a foundation for an acquisition process discipline that provides repeatable product and service development with high levels of acquisition success; this article reports on advances and revisions to the ""American Institute of Aeronautic...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, August 20...

By: John D. Holcomb, Michael Hoehn, Chris D. Moore, W. Mark Vanfleet, R. William Beckwith, Dr. Ben Calloni, Jahn A. Luke, Dr. Carol Taylor, Gordon Uchenick, Arlene F. Minkiewicz, Paul J. Solomon, Bill Ravensberg

Description: These authors discuss how the 76th Software Maintenance Group successfully develops software for the Department of Defense using two key elements: high fidelity test environments and collaboration; here is how the 402nd Software Maintenance Group successfully partnered with Northrop Grumman Corporation to maintain the complex E-8C Joint Surveillance Tactical Airborne Radar Systems software; These authors propose that the Multiple Independent Levels of Securi...

Read More
  • Cover Image

Crosstalk : The Journal of Defense Software Engineering, August 20...

By: Richard L. Conn, Dr. Benjamin M. Brosgol, Dr. Bo I. Sanden, Dr. Martin C. Carlisle, S. Tucker Taft, Val C. Kartchner, Paul R. Hicks

Description: This article discusses the creation and key new features of Ada 2005 and compares it to other computer programming languages.; this article examines how Ada 2005 offers particular innovations that will help make safety certification less costly and improves support for high-integrity systems in three major areas; this article describes Ada multitasking as it now exists. This Ada feature builds on the same concepts as Java but is considerably safer; this arti...

Read More
 
1
|
2
|
3
|
4
|
5
Records: 1 - 20 of 149 - Pages: 



Copyright © World Public Library. All rights reserved. eBooks from World Public Library are sponsored by the World Public Library Association,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.